syzkaller login: [ 65.417412][ T38] audit: type=1400 audit(1575130284.873:41): avc: denied { map } for pid=7866 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '[localhost]:3823' (ECDSA) to the list of known hosts. [ 67.371411][ T38] audit: type=1400 audit(1575130286.823:42): avc: denied { map } for pid=7877 comm="syz-fuzzer" path="/syz-fuzzer" dev="sda1" ino=16525 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 2019/11/30 16:11:26 fuzzer started 2019/11/30 16:11:27 dialing manager at 10.0.2.10:40921 2019/11/30 16:11:27 syscalls: 2533 2019/11/30 16:11:27 code coverage: enabled 2019/11/30 16:11:27 comparison tracing: enabled 2019/11/30 16:11:27 extra coverage: extra coverage is not supported by the kernel 2019/11/30 16:11:27 setuid sandbox: enabled 2019/11/30 16:11:27 namespace sandbox: enabled 2019/11/30 16:11:27 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/30 16:11:27 fault injection: enabled 2019/11/30 16:11:27 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/30 16:11:27 net packet injection: enabled 2019/11/30 16:11:27 net device setup: enabled 2019/11/30 16:11:27 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/30 16:11:27 devlink PCI setup: PCI device 0000:00:10.0 is not available 16:11:40 executing program 0: socket$unix(0x1, 0x2, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x0, {0x0, 0x2, 0x3}}, 0xfffffffffffffd04) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000000c0)) socket(0x10, 0x0, 0x0) r2 = semget$private(0x0, 0x2000000010a, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, 0x0, &(0x7f0000000040)) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000180)=""/103) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) close(r0) [ 81.074151][ T38] audit: type=1400 audit(1575130300.523:43): avc: denied { map } for pid=7899 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=93 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 16:11:40 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x200000000038) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x7d, 0x0, 0x20000000, 0xf9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 81.269124][ T7900] IPVS: ftp: loaded support on port[0] = 21 [ 81.307198][ T7902] IPVS: ftp: loaded support on port[0] = 21 [ 81.350306][ T7900] chnl_net:caif_netlink_parms(): no params data found [ 81.389502][ T7900] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.398217][ T7900] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.406280][ T7900] device bridge_slave_0 entered promiscuous mode [ 81.416060][ T7900] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.424228][ T7900] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.432907][ T7900] device bridge_slave_1 entered promiscuous mode [ 81.455037][ T7900] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.469979][ T7900] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.512150][ T7900] team0: Port device team_slave_0 added [ 81.521256][ T7900] team0: Port device team_slave_1 added [ 81.528217][ T7902] chnl_net:caif_netlink_parms(): no params data found [ 81.618590][ T7900] device hsr_slave_0 entered promiscuous mode [ 81.667219][ T7900] device hsr_slave_1 entered promiscuous mode [ 81.745133][ T7902] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.753086][ T7902] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.761393][ T7902] device bridge_slave_0 entered promiscuous mode [ 81.769689][ T7902] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.777419][ T7902] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.785271][ T7902] device bridge_slave_1 entered promiscuous mode [ 81.807840][ T7902] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.820586][ T7902] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.837733][ T38] audit: type=1400 audit(1575130301.293:44): avc: denied { create } for pid=7900 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 81.863705][ T38] audit: type=1400 audit(1575130301.293:45): avc: denied { write } for pid=7900 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 81.863725][ T38] audit: type=1400 audit(1575130301.293:46): avc: denied { read } for pid=7900 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 81.915963][ T7900] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 82.003319][ T7900] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 82.068559][ T7900] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 82.119746][ T7902] team0: Port device team_slave_0 added [ 82.127479][ T7900] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 82.239879][ T7902] team0: Port device team_slave_1 added [ 82.318368][ T7902] device hsr_slave_0 entered promiscuous mode [ 82.386764][ T7902] device hsr_slave_1 entered promiscuous mode [ 82.466488][ T7902] debugfs: Directory 'hsr0' with parent '/' already present! [ 82.503330][ T7902] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 82.569024][ T7902] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 82.618371][ T7902] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 82.670170][ T7902] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 82.790912][ T7900] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.806470][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 82.814578][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 82.827628][ T7900] 8021q: adding VLAN 0 to HW filter on device team0 [ 82.838413][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 82.847491][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 82.855908][ T36] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.863286][ T36] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.874202][ T3969] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 82.885699][ T3074] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 82.894739][ T3074] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 82.903322][ T3074] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.910591][ T3074] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.922973][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 82.934162][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 82.946448][ T3969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 82.955017][ T3969] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 82.965788][ T3969] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 82.978673][ T7902] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.986249][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 82.995283][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 83.010549][ T7900] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 83.022138][ T7900] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 83.036037][ T7907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 83.044607][ T7907] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 83.053575][ T7907] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 83.062369][ T7907] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 83.072507][ T7907] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 83.084036][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 83.091966][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 83.103370][ T7902] 8021q: adding VLAN 0 to HW filter on device team0 [ 83.115412][ T7907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 83.124561][ T7907] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 83.134788][ T7907] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.142164][ T7907] bridge0: port 1(bridge_slave_0) entered forwarding state [ 83.150115][ T7907] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 83.158324][ T7907] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 83.169065][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 83.177344][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 83.185945][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 83.194438][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.201888][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 83.212829][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 83.223946][ T7900] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 83.235208][ T3342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 83.246711][ T38] audit: type=1400 audit(1575130302.693:47): avc: denied { associate } for pid=7900 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 83.275758][ T3342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 83.284632][ T3342] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 83.294159][ T3342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 83.304189][ T3342] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 83.313046][ T3342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 83.323564][ T3342] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 83.333684][ T3342] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 83.341787][ T3342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 83.350402][ T3342] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 83.361697][ T7902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 83.378775][ T3969] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 83.386238][ T3969] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 83.394508][ T38] audit: type=1400 audit(1575130302.853:48): avc: denied { open } for pid=7910 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 83.398376][ T7902] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 83.428779][ T38] audit: type=1400 audit(1575130302.853:49): avc: denied { kernel } for pid=7910 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 16:11:42 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd870, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r2 = getpid() r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = dup(0xffffffffffffffff) r8 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r8, &(0x7f0000000140), 0x332, 0x0) r9 = dup(0xffffffffffffffff) socket$inet6(0xa, 0xa, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) write$binfmt_script(r4, &(0x7f00000001c0)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[@ANYRESDEC, @ANYPTR64=&(0x7f0000000340)=ANY=[@ANYRES64=r6, @ANYRESHEX=r7, @ANYBLOB="260cbb93e700edd33fd2d36da6a95862f3acb58f0badfbc846779a6f80b83380ac6f31dd0a8be765344b013bc54b7e4111f4cf4c278aa5f22d6f2581e6b97bffa13d609fa1da55d4a78871fd8aab24cf402e0bef1b4d229114ef43b246116a6325d2d38a404b4efb1dffc0b82d3322cc316782c8fdf53eb9a972d7b7ea2cc3abcb94b55e48d6dbbbfb4d14fcd7daba195136222fba0b8e1ca5bda98d83dbc279fbb2af450032f56e3c4643d71f399978618cf81bfe6bbcb49dcf501c9d1c525006355d79feea449f732b4949", @ANYRESOCT=r0, @ANYRES16=0x0], @ANYRES16=r8, @ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES32=0x0], @ANYRESOCT, @ANYRES32=0x0, @ANYRES16, @ANYRES32=r9]], 0xbd) prctl$PR_SET_PTRACER(0x59616d61, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) lookup_dcookie(0x9cd5, &(0x7f0000000000)=""/9, 0x9) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) [ 83.615190][ T38] audit: type=1400 audit(1575130303.063:50): avc: denied { write } for pid=7920 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 83.901926][ C3] hrtimer: interrupt took 46973 ns 16:11:45 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0x2, 0x80002, 0x0) setsockopt$inet_int(r1, 0x0, 0xb, &(0x7f00000000c0)=0x1002, 0x4) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) recvfrom(r1, 0x0, 0x0, 0x12062, 0x0, 0x0) [ 86.478133][ T7937] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 16:11:45 executing program 1: syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x638, 0x8083) r0 = syz_open_dev$midi(0x0, 0x0, 0x8083) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, [0xfffffffe]}) 16:11:46 executing program 1: syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x638, 0x8083) r0 = syz_open_dev$midi(0x0, 0x0, 0x8083) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, [0xfffffffe]}) [ 237.316689][ T1115] INFO: task syz-executor.0:7927 blocked for more than 142 seconds. [ 237.326242][ T1115] Not tainted 5.4.0-syzkaller #0 [ 237.334124][ T1115] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 237.346712][ T1115] syz-executor.0 D28224 7927 7900 0x00004004 [ 237.355119][ T1115] Call Trace: [ 237.360238][ T1115] __schedule+0x8e1/0x1f30 [ 237.366144][ T1115] ? __sched_text_start+0x8/0x8 [ 237.372745][ T1115] ? lock_downgrade+0x920/0x920 [ 237.378610][ T1115] ? rwlock_bug.part.0+0x90/0x90 [ 237.385112][ T1115] schedule+0xdc/0x2b0 [ 237.390750][ T1115] schedule_preempt_disabled+0x13/0x20 [ 237.398193][ T1115] __mutex_lock+0x7ab/0x13c0 [ 237.402952][ T1115] ? perf_event_ctx_lock_nested+0x296/0x4c0 [ 237.409072][ T1115] ? mutex_trylock+0x2f0/0x2f0 [ 237.413875][ T1115] ? find_held_lock+0x35/0x130 [ 237.420196][ T1115] ? perf_event_ctx_lock_nested+0x262/0x4c0 [ 237.426160][ T1115] ? avc_has_perm+0x3fc/0x610 [ 237.431042][ T1115] ? lock_downgrade+0x920/0x920 [ 237.436007][ T1115] mutex_lock_nested+0x16/0x20 [ 237.441074][ T1115] ? mutex_lock_nested+0x16/0x20 [ 237.446104][ T1115] perf_event_ctx_lock_nested+0x296/0x4c0 [ 237.452026][ T1115] ? __perf_event_read+0xe10/0xe10 [ 237.458441][ T1115] ? selinux_perf_event_write+0x116/0x160 [ 237.465136][ T1115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 237.471651][ T1115] perf_ioctl+0x69/0xb0 [ 237.475927][ T1115] ? _perf_ioctl+0x1120/0x1120 [ 237.480914][ T1115] do_vfs_ioctl+0xdb6/0x13e0 [ 237.485656][ T1115] ? ioctl_preallocate+0x210/0x210 [ 237.491004][ T1115] ? selinux_file_mprotect+0x620/0x620 [ 237.497615][ T1115] ? __fget+0x37f/0x550 [ 237.501957][ T1115] ? ksys_dup3+0x3e0/0x3e0 [ 237.506636][ T1115] ? nsecs_to_jiffies+0x30/0x30 [ 237.511478][ T1115] ? tomoyo_file_ioctl+0x23/0x30 [ 237.516707][ T1115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 237.524130][ T1115] ? security_file_ioctl+0x8d/0xc0 [ 237.529504][ T1115] ksys_ioctl+0xab/0xd0 [ 237.533776][ T1115] __x64_sys_ioctl+0x73/0xb0 [ 237.538659][ T1115] do_syscall_64+0xfa/0x790 [ 237.543255][ T1115] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 237.549382][ T1115] RIP: 0033:0x45a759 [ 237.554327][ T1115] Code: Bad RIP value. [ 237.558661][ T1115] RSP: 002b:00007fc7dc139c88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 237.567475][ T1115] RAX: ffffffffffffffda RBX: 000000000071c050 RCX: 000000000045a759 [ 237.575517][ T1115] RDX: ffffffffffffffff RSI: 0000000000002405 RDI: 0000000000000003 [ 237.583767][ T1115] RBP: 0000000000000003 R08: 0000000000000000 R09: 0000000000000000 [ 237.591910][ T1115] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc7dc13a6d4 [ 237.600433][ T1115] R13: 00000000004b60c0 R14: 00000000006ec968 R15: 00000000ffffffff [ 237.608587][ T1115] [ 237.608587][ T1115] Showing all locks held in the system: [ 237.616533][ T1115] 1 lock held by khungtaskd/1115: [ 237.621709][ T1115] #0: ffffffff895a4080 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x279 [ 237.632981][ T1115] 2 locks held by rsyslogd/7718: [ 237.638271][ T1115] #0: ffff888021aad160 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 237.647159][ T1115] #1: ffff88802d237398 (&rq->lock){-.-.}, at: newidle_balance+0xa28/0xe80 [ 237.655815][ T1115] 2 locks held by getty/7841: [ 237.660619][ T1115] #0: ffff888029b10090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 237.669788][ T1115] #1: ffffc900040162e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 237.679706][ T1115] 2 locks held by getty/7842: [ 237.684415][ T1115] #0: ffff88802a9bf090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 237.693701][ T1115] #1: ffffc900040022e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 237.703594][ T1115] 2 locks held by getty/7843: [ 237.708562][ T1115] #0: ffff888027719090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 237.717576][ T1115] #1: ffffc9000401a2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 237.727393][ T1115] 2 locks held by getty/7844: [ 237.732218][ T1115] #0: ffff88802950a090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 237.741638][ T1115] #1: ffffc9000400e2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 237.752748][ T1115] 2 locks held by getty/7845: [ 237.757565][ T1115] #0: ffff8880277e4090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 237.766594][ T1115] #1: ffffc9000401e2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 237.776265][ T1115] 2 locks held by getty/7846: [ 237.781103][ T1115] #0: ffff8880250ae090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 237.790276][ T1115] #1: ffffc900040222e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 237.799941][ T1115] 2 locks held by getty/7847: [ 237.804730][ T1115] #0: ffff888026afb090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 237.813921][ T1115] #1: ffffc900026f22e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 237.823533][ T1115] 3 locks held by syz-executor.0/7921: [ 237.829266][ T1115] 1 lock held by syz-executor.0/7927: [ 237.834744][ T1115] #0: ffff888026b9e4a0 (&ctx->mutex){+.+.}, at: perf_event_ctx_lock_nested+0x296/0x4c0 [ 237.844910][ T1115] [ 237.847388][ T1115] ============================================= [ 237.847388][ T1115] [ 237.855814][ T1115] NMI backtrace for cpu 2 [ 237.860375][ T1115] CPU: 2 PID: 1115 Comm: khungtaskd Not tainted 5.4.0-syzkaller #0 [ 237.868409][ T1115] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 237.870324][ T1115] Call Trace: [ 237.870324][ T1115] dump_stack+0x197/0x210 [ 237.870324][ T1115] nmi_cpu_backtrace.cold+0x70/0xb2 [ 237.870324][ T1115] ? vprintk_func+0x86/0x189 [ 237.870324][ T1115] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 237.870324][ T1115] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 237.870324][ T1115] arch_trigger_cpumask_backtrace+0x14/0x20 [ 237.870324][ T1115] watchdog+0xb11/0x10c0 [ 237.870324][ T1115] kthread+0x361/0x430 [ 237.870324][ T1115] ? reset_hung_task_detector+0x30/0x30 [ 237.870324][ T1115] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 237.870324][ T1115] ret_from_fork+0x24/0x30 [ 237.944464][ T1115] Sending NMI from CPU 2 to CPUs 0-1,3: [ 237.950437][ C0] NMI backtrace for cpu 0 skipped: idling at native_safe_halt+0xe/0x10 [ 237.950445][ C3] NMI backtrace for cpu 3 skipped: idling at native_safe_halt+0xe/0x10 [ 237.951233][ C1] NMI backtrace for cpu 1 [ 237.951237][ C1] CPU: 1 PID: 7921 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 [ 237.951243][ C1] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 237.951245][ C1] RIP: 0010:rcu_is_watching+0x0/0x30 [ 237.951253][ C1] Code: 5c 5d d1 e8 83 f0 01 83 e0 01 c3 4c 89 e7 e8 27 a8 4f 00 eb df 48 89 45 e8 e8 3c a8 4f 00 48 8b 45 e8 eb 8e 66 0f 1f 44 00 00 <55> 48 89 e5 65 ff 05 ed ba 9f 7e e8 40 ff ff ff 83 f0 01 65 ff 0d [ 237.951256][ C1] RSP: 0018:ffff88802d309830 EFLAGS: 00000002 [ 237.951261][ C1] RAX: 0000000000000001 RBX: ffff88802d309870 RCX: 1ffffffff146e1da [ 237.951265][ C1] RDX: 0000000000000000 RSI: ffffffff816532dc RDI: ffff8880712a0994 [ 237.951268][ C1] RBP: ffff88802d309840 R08: ffff8880712a0100 R09: fffffbfff146dba1 [ 237.951272][ C1] R10: fffffbfff146dba0 R11: ffffffff8a36dd07 R12: 0000000000000001 [ 237.951275][ C1] R13: ffff88801fc3a160 R14: ffff88802d329440 R15: dffffc0000000000 [ 237.951279][ C1] FS: 00007fc7dc17c700(0000) GS:ffff88802d300000(0000) knlGS:0000000000000000 [ 237.951282][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 237.951285][ C1] CR2: 00007f5351bc5000 CR3: 00000000715ff000 CR4: 00000000003406e0 [ 237.951289][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 237.951293][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 237.951294][ C1] Call Trace: [ 237.951296][ C1] [ 237.951299][ C1] ? rcu_read_lock_held_common+0xb4/0x130 [ 237.951302][ C1] rcu_read_lock_sched_held+0x5b/0xd0 [ 237.951304][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 237.951307][ C1] __hrtimer_run_queues+0xc71/0xe40 [ 237.951309][ C1] ? __perf_event_overflow+0x370/0x370 [ 237.951312][ C1] ? hrtimer_init+0x330/0x330 [ 237.951314][ C1] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 237.951317][ C1] ? ktime_get_update_offsets_now+0x2ce/0x430 [ 237.951320][ C1] hrtimer_interrupt+0x314/0x770 [ 237.951322][ C1] smp_apic_timer_interrupt+0x160/0x610 [ 237.951325][ C1] apic_timer_interrupt+0xf/0x20 [ 237.951327][ C1] RIP: 0010:_raw_spin_unlock_irqrestore+0x90/0xe0 [ 237.951335][ C1] Code: 48 c7 c0 58 34 53 89 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 39 48 83 3d ff 25 99 01 00 74 24 48 89 df 57 9d <0f> 1f 44 00 00 bf 01 00 00 00 e8 e1 67 96 f9 65 8b 05 12 10 48 78 [ 237.951338][ C1] RSP: 0018:ffff88802d309b68 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 237.951344][ C1] RAX: 1ffffffff12a668b RBX: 0000000000000282 RCX: 0000000000000002 [ 237.951347][ C1] RDX: dffffc0000000000 RSI: 0000000000000008 RDI: 0000000000000282 [ 237.951351][ C1] RBP: ffff88802d309b78 R08: 1ffffffff15d29b8 R09: fffffbfff15d29b9 [ 237.951355][ C1] R10: fffffbfff15d29b8 R11: ffffffff8ae94dc7 R12: ffffffff8bcfda60 [ 237.951358][ C1] R13: 0000000000000282 R14: ffff888016edc140 R15: dffffc0000000000 [ 237.951360][ C1] ? apic_timer_interrupt+0xa/0x20 [ 237.951363][ C1] aoenet_xmit+0x148/0x210 [ 237.951365][ C1] aoecmd_cfg+0x46a/0x640 [ 237.951367][ C1] ? aoecmd_ata_rsp+0x13a0/0x13a0 [ 237.951369][ C1] ? mod_timer+0x50c/0xc10 [ 237.951372][ C1] ? timer_reduce+0xde0/0xde0 [ 237.951374][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 237.951377][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 237.951379][ C1] discover_timer+0x4e/0x60 [ 237.951382][ C1] call_timer_fn+0x1ac/0x780 [ 237.951384][ C1] ? aoedev_by_aoeaddr.cold+0x83/0x83 [ 237.951387][ C1] ? msleep_interruptible+0x150/0x150 [ 237.951389][ C1] ? run_timer_softirq+0x6b1/0x1790 [ 237.951391][ C1] ? trace_hardirqs_on+0x67/0x240 [ 237.951394][ C1] ? aoedev_by_aoeaddr.cold+0x83/0x83 [ 237.951397][ C1] ? aoedev_by_aoeaddr.cold+0x83/0x83 [ 237.951399][ C1] run_timer_softirq+0x6c3/0x1790 [ 237.951401][ C1] ? add_timer+0x930/0x930 [ 237.951404][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 237.951407][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 237.951409][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 237.951411][ C1] __do_softirq+0x262/0x98c [ 237.951414][ C1] ? sched_clock_cpu+0x14e/0x1b0 [ 237.951416][ C1] irq_exit+0x19b/0x1e0 [ 237.951419][ C1] smp_apic_timer_interrupt+0x1a3/0x610 [ 237.951421][ C1] apic_timer_interrupt+0xf/0x20 [ 237.951423][ C1] [ 237.951425][ C1] RIP: 0010:_raw_spin_unlock_irq+0x4f/0x80 [ 237.951433][ C1] Code: c0 68 34 53 89 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 33 48 83 3d 12 2a 99 01 00 74 20 fb 66 0f 1f 44 00 00 01 00 00 00 e8 e7 6b 96 f9 65 8b 05 18 14 48 78 85 c0 74 06 41 [ 237.951436][ C1] RSP: 0018:ffff8880712af8d8 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 [ 237.951442][ C1] RAX: 1ffffffff12a668d RBX: ffff8880712a0100 RCX: 0000000000000006 [ 237.951445][ C1] RDX: dffffc0000000000 RSI: 0000000000000008 RDI: ffff8880712a0994 [ 237.951449][ C1] RBP: ffff8880712af8e0 R08: 1ffffffff15d29b8 R09: fffffbfff15d29b9 [ 237.951452][ C1] R10: fffffbfff15d29b8 R11: ffffffff8ae94dc7 R12: ffff88802d337380 [ 237.951455][ C1] R13: ffff88802c520580 R14: ffff88807123e040 R15: 0000000000000001 [ 237.951458][ C1] ? _raw_spin_unlock_irq+0x23/0x80 [ 237.951460][ C1] finish_task_switch+0x147/0x750 [ 237.951463][ C1] ? finish_task_switch+0x119/0x750 [ 237.951465][ C1] __schedule+0x8e9/0x1f30 [ 237.951467][ C1] ? __sched_text_start+0x8/0x8 [ 237.951470][ C1] ? __this_cpu_preempt_check+0x35/0x190 [ 237.951472][ C1] ? retint_kernel+0x2b/0x2b [ 237.951475][ C1] ? perf_duration_warn+0x40/0x40 [ 237.951477][ C1] ? preempt_schedule+0x4b/0x60 [ 237.951480][ C1] preempt_schedule_common+0x4f/0xe0 [ 237.951482][ C1] ? __perf_event_enable+0x930/0x930 [ 237.951485][ C1] preempt_schedule+0x4b/0x60 [ 237.951487][ C1] ___preempt_schedule+0x16/0x18 [ 237.951490][ C1] ? smp_call_function_single+0x40b/0x480 [ 237.951493][ C1] smp_call_function_single+0x410/0x480 [ 237.951495][ C1] ? perf_duration_warn+0x40/0x40 [ 237.951497][ C1] ? generic_exec_single+0x4c0/0x4c0 [ 237.951500][ C1] ? __do_sys_perf_event_open+0x174c/0x2c70 [ 237.951503][ C1] ? __perf_event_enable+0x930/0x930 [ 237.951505][ C1] task_function_call+0xe9/0x180 [ 237.951508][ C1] ? perf_event_addr_filters_exec+0x310/0x310 [ 237.951511][ C1] ? __do_sys_perf_event_open+0x174c/0x2c70 [ 237.951513][ C1] ? __perf_event_enable+0x930/0x930 [ 237.951516][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 237.951519][ C1] ? exclusive_event_installable+0x257/0x320 [ 237.951521][ C1] perf_install_in_context+0x308/0x5a0 [ 237.951523][ C1] ? list_add_event+0xed0/0xed0 [ 237.951526][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 237.951529][ C1] ? __perf_event_header_size.isra.0+0x166/0x1c0 [ 237.951532][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 237.951535][ C1] __do_sys_perf_event_open+0x1cbc/0x2c70 [ 237.951537][ C1] ? perf_event_set_output+0x4e0/0x4e0 [ 237.951540][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 237.951542][ C1] ? put_timespec64+0xda/0x140 [ 237.951545][ C1] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 237.951547][ C1] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 237.951550][ C1] ? do_syscall_64+0x26/0x790 [ 237.951552][ C1] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 237.951555][ C1] ? do_syscall_64+0x26/0x790 [ 237.951557][ C1] __x64_sys_perf_event_open+0xbe/0x150 [ 237.951559][ C1] do_syscall_64+0xfa/0x790 [ 237.951562][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 237.951564][ C1] RIP: 0033:0x45a759 [ 237.951572][ C1] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 237.951574][ C1] RSP: 002b:00007fc7dc17bc88 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 237.951580][ C1] RAX: ffffffffffffffda RBX: 000000000071bf00 RCX: 000000000045a759 [ 237.951584][ C1] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000000020000040 [ 237.951587][ C1] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 237.951591][ C1] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007fc7dc17c6d4 [ 237.951594][ C1] R13: 00000000004aec2b R14: 00000000006f1ca8 R15: 00000000ffffffff [ 237.951628][ T1115] Kernel panic - not syncing: hung_task: blocked tasks [ 237.960149][ T1115] CPU: 2 PID: 1115 Comm: khungtaskd Not tainted 5.4.0-syzkaller #0 [ 237.960149][ T1115] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 237.960149][ T1115] Call Trace: [ 237.960149][ T1115] dump_stack+0x197/0x210 [ 237.960149][ T1115] panic+0x2e3/0x75c [ 237.960149][ T1115] ? add_taint.cold+0x16/0x16 [ 237.960149][ T1115] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 237.960149][ T1115] ? printk_safe_flush+0xf2/0x140 [ 237.960149][ T1115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 237.960149][ T1115] ? nmi_trigger_cpumask_backtrace+0x224/0x28b [ 237.960149][ T1115] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 237.960149][ T1115] watchdog+0xb22/0x10c0 [ 237.960149][ T1115] kthread+0x361/0x430 [ 237.960149][ T1115] ? reset_hung_task_detector+0x30/0x30 [ 237.960149][ T1115] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 237.960149][ T1115] ret_from_fork+0x24/0x30 [ 237.960149][ T1115] Kernel Offset: disabled [ 237.960149][ T1115] Rebooting in 86400 seconds..